We’re a different kind of security company. We’re here to help our customers navigate the ever-evolving security landscape by offering an unbiased perspective from a team of passionate, cybersecurity experts. We know you will always understand your infrastructure, culture, and policies better than any third party. Our perspective, combined with your organizational expertise, results in better decision making and a stronger security posture.
Planning for the Future, Investing in our People
Our clients don’t need someone who can sell them security tools. Several companies offer basic, commoditized fulfillment services. Clients need a cybersecurity partner who is investing in programs that equip our employees with the necessary skills to assist clients.
Critical Start was founded with one goal: Improve the security capabilities of our customers. We accomplish this goal using a strategy-based approach called the Defendable Network.
We’re a different kind of security company. We’re here to help our customers navigate the ever-evolving security landscape by offering an unbiased perspective from a team of passionate, cybersecurity experts. We know you will always understand your infrastructure, culture, and policies better than any third party. Our perspective, combined with your organizational expertise, results in better decision making and a stronger security posture.
Owned by Employees, Driven by Your Needs
Critical Start is a 100% employee owned company. Why is this important? The lack of private equity, debt, or venture capital funds allows Critical Start to prioritize long-term relationships versus short-term quarterly objectives. Thanks to client referrals, Critical Start has grown to be the largest and fastest growing cybersecurity company headquartered in Texas as measured by the 2017 CRN Solution Provider 500.
Common-Sense Approach
We created the Defendable Network to offer a common-sense approach to complex security standards to achieve a specific Security Readiness Condition (SecCon) level. This proven security framework seeks to prevent initial compromise, restrict lateral movement, and swiftly respond to breaches. Our prioritized roadmap considers common-sense requirements like user experience, operational expenses, implementation efforts, and business needs.
SecCon levels range from 5 (highest risk with lowest resources) to 1 (lowest risk and most resources). The progression from 5 to 1 is exponential, with headcount and cost doubling each step along the way. This is not a maturity model, but rather a desired outcome for an organization to match risk tolerance, budget, and threats of concern. The methodology is not to determine which products (if any) should be purchased, but to define a set of capabilities to accomplish specific security goals. The effectiveness of those capabilities lean heavily on another aspect of security that drives our approach: the people aspect. Good governance and processes, as well as secure architecture and configuration all play a crucial role in any security program.